• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4213 Cat courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

M207031 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. MANAGING COMPUTERS AND MOBILE DEVICES IN THE ENTERPRISE * Overview of systems management by using enterprise management solutions * Overview of the Configuration Manager architecture * Overview of the Configuration Manager administrative tools * Tools for monitoring and troubleshooting a Configuration Manager site * Lab : Exploring the Configuration Manager tools * Searching in the Configuration Manager console * Using Windows PowerShell with Configuration Manager * Using Configuration Manager Service Manager to manage components * Monitoring site and component status * Reviewing log files by using the Configuration Manager Trace tool * Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. * Describe the Configuration Manager architecture. * Describe the management tools that you use to perform administrative functions for Configuration Manager. * Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. ANALYZING DATA USING QUERIES AND REPORTS * Introduction to queries * Configuring Microsoft SQL Server Reporting Services (SSRS) * Lab : Creating and running queriesConfiguring boundaries and resource discovery * Creating data queries * Creating subselect queries * Creating status message queries * Lab : Configuring SSRS * Configuring a reporting services point * Creating a report by using Report Builder * Create and configure data and status message queries. * Configure and manage SSRS and the reporting services point. PREPARING THE MANAGEMENT INFRASTRUCTURE TO SUPPORT PCS AND MOBILE DEVICES * Configuring site boundaries and boundary groups * Configuring resource discovery * Configuring the Exchange Server Connector for mobile device management * Configuring user and device collections * Lab : Configuring boundaries and resource discovery * Configuring boundaries, boundary groups, and fallback relationships * Configuring Active Directory discovery methods * Lab : Configuring user and device collections * Creating a device collection * Creating a user collection * Configuring a maintenance window * Configure boundaries and boundary groups. * Configure resource discovery. * Configure the Exchange Server connector mobile device management. * Organize resources using device and user collections. DEPLOYING AND MANAGING CLIENTS * Overview of the Configuration Manager client * Deploying the Configuration Manager client * Configuring and monitoring client status * Managing client settings in Configuration Manager * Lab : Deploying the Microsoft System Center Configuration Manager client software * Preparing the site for client installation * Deploying the Configuration Manager client software by using client push installation * Lab : Configuring and monitoring client status * Configuring and monitoring client health status * Lab : Managing client settings * Configuring client settings * Describe the requirements and considerations for installing the Configuration Manager client software. * Deploy the Configuration Manager client software. * Configure and monitor client status. * Manage Configuration Manager client settings. MANAGING INVENTORY FOR PCS AND APPLICATIONS * Overview of inventory collection * Configuring hardware and software inventory * Managing inventory collection * Configuring software metering * Configuring and managing Asset Intelligence * Lab : Configuring and managing inventory collection * Configuring and managing hardware inventory * Lab : Configuring software metering * Configuring software metering * Lab : Configuring and managing Asset Intelligence * Preparing the site for Asset Intelligence * Configuring Asset Intelligence * Monitoring license agreements by using Asset Intelligence * Viewing Asset Intelligence reports * Describe inventory collection. * Configure and collect hardware and software inventory. * Manage inventory collection. * Configure software metering. * Configure Asset Intelligence. DISTRIBUTING AND MANAGING CONTENT USED FOR DEPLOYMENTS * Preparing the infrastructure for content management * Distributing and managing content on distribution points * Lab : Distributing and managing content for deployments * Installing a new distribution point * Managing content distribution * Prepare the infrastructure for content management. * Distribute and manage content on distribution points. DEPLOYING AND MANAGING APPLICATIONS * Overview of application management * Creating applications * Deploying applications * Managing applications * Deploying virtual applications by using System Center Configuration Manager (Optional) * Deploying and managing Windows Store apps * Lab : Creating and deploying applications * Installing and configuring the Application Catalog roles * Creating applications with requirements * Deploying applications * Lab : Managing application supersedence and removal * Managing application supersedence * Uninstalling the Excel Viewer application * Lab : Deploying virtual applications by using Configuration Manager (Optional) * Configuring support for App-V * Deploying virtual applications * Lab : Using Configuration Manager to deploy Windows Store apps * Configuring support for sideloading Windows Store apps * Configuring a Windows Store app * Deploying Windows 10 apps to users * Describe the application management features of Configuration Manager. * Create applications. * Deploy applications. * Manage applications. * Configure and deploy virtual applications. * Configure and deploy Windows Store apps. MAINTAINING SOFTWARE UPDATES FOR MANAGED PCS * The software updates process * Preparing a Configuration Manager site for software updates * Managing software updates * Configuring automatic deployment rules * Monitoring and troubleshooting software updates * Lab : Configuring the site for software updates * Configuring and synchronizing the software update point * Lab : Deploying and managing software updates * Determining software update compliance * Deploying software updates to clients * Configuring automatic deployment rules * Describe how the software updates feature integrates with Configuration Manager. * Prepare the Configuration Manager site for software updates. * Manage the evaluation and deployment of software updates. * Configure automatic deployment rules. * Monitor and troubleshoot software updates. IMPLEMENTING ENDPOINT PROTECTION FOR MANAGED PCS * Overview of Endpoint Protection in Configuration Manager * Configuring, deploying, and monitoring Endpoint Protection policies * Lab : Implementing Microsoft System Center Endpoint Protection * Configuring the System Center Endpoint Protection point and client settings * Configuring and deploying Endpoint Protection policies * Monitoring Endpoint Protection * Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. * Configure, deploy, and manage Endpoint Protection policies. MANAGING COMPLIANCE AND SECURE DATA ACCESS * Overview of Compliance Settings * Configuring compliance sett

M207031 Administering System Center Configuration Manager
Delivered on-request, onlineDelivered Online
Price on Enquiry

BA03 - Writing Effective Business Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for intermediate business and requirements analysts who are looking to improve their business case development and presentation skills. This course is also a great fit for project managers and product owners who work closely with business analysts or who perform some form of business case work themselves. Overview Understand the role of the business analyst within the business case process Understand the main professional associations and standards that support business analysts in the industry Discuss the benefits of business case creation Explore how to define the business need Describe the role of the business analyst in supporting the enterprise to determine how to optimally invest in the right project initiatives Explain how to identify stakeholders and the significance to the pre-project activities Discuss the importance of analyzing the enterprise Describe and explore the activities performed to assess the current business environment Explain how a business analyst describes a ?future? state environment including how to identify gaps in enterprise capabilities Present and explore how to define the scope of a solution Describe the activities performed and techniques used to determine viable solution options Explore various techniques for evaluating solution options including feasibility and risk analysis Thoroughly understand the purpose of conducting a feasibility assessment Discuss and practice a number of business analysis techniques that support the business case process Explore the components of a business case Describe how the business case supports decision makers in making go/no-go decisions Demonstrate how to assemble the output from pre-project activities into a well-structured business case Present techniques for presenting business cases to top level managers and obtaining buy-in Discuss methods for preparing for challenges during business case delivery Students learn the steps to effective business case development and support your strategic business recommendations with sound budgeting and financial back-up. The one course you need to make high-impact recommendations and receive full management support for your ideas. INTRODUCTION * Module Learning Objectives * What is Business Analysis * Polling Question * International Institute of Business Analysis * BABOK© Guide Components * Project Management Institute * Business Analysis for Practitioners: A Practice Guide * BABOK© Guide Knowledge Areas * Benefits of Business Analysis * Polling Question * A Business Analyst can Influence Project Success Factors * Challenges of Business Analysis * Polling Question * Purpose of a Business Case * Exercise 1a: What Should a Business Case Include * Define the Business Case Elements * What to Look Out For * Who is Involved * Exercise 1b: Review Business Case Outline * Module Learning Objectives PRE-PROJECT ACTIVITIES & THE BUSINESS ANALYST * Module Learning Objectives * The Definition of a Business Analyst * The Role of a Business Analyst * Responsibilities of a BA * BA Role vs. PM Role * Business Analysis vs. Systems Analysis * Business Analysis Competencies * Polling Question * Business Analyst Role and Stakeholders * Exercise 2a: Review the Case Study * What is a Stakeholder? * The Importance of Stakeholders * Stakeholder Identification * Tips for Identifying Stakeholders * Other Stakeholder Tips * Stakeholder Identification/Analysis * Exercise 2b: Identify Roles and Responsibilities * Stakeholder Map * Stakeholder Matrix & Onion Diagrams * A Stakeholder Map * Onion Diagram * Exercise 2c: Why do we Need to Understand the Enterprise? * Why Study the Enterprise? * What is Enterprise Architecture? * What is Strategy Analysis? * About Strategy Analysis * Purpose of Strategy Analysis * When to Perform Strategy Analysis * Strategic Planning * Module Summary THE NEEDS ASSESSMENT PROCESS * Module Learning Objectives * Business Need Defined * Define Business Need * The Needs Assessment Process * Problem or Opportunity * Exercise 3a: Problem/Opportunity Identification * Understanding Why * Situation Statements * Business Need and Current State * Determine the Stakeholders * Polling Question * Goals and Objectives * Polling Question * Exercise 3b: Give 3 Examples of Business Goals * Define Business Need Techniques * Exercise 3c: Identify the Business Need * Definition of Strategy Analysis * When Business Strategy is not Driving Project Definition * Typical Project Profile * The Executive Paradox * Solution to the Paradox * Exercise 3d: Describe 3 Outcomes You Would Expect from the Case Study * The Four ?Ares? * Understand How to Create a Business Model * Business Model Example * Exercise 3e: Create a Business Model * The Business Case Approach * Financial and Strategic Measurement Tools * Module Summary DETERMINING THE REQUIRED CAPABILITIES & DEFINING SOLUTION SCOPE * Module Learning Objectives * Business Need and Current State * Purpose of Analyzing the Current State * Analyzing Current Capabilities and Process * Capabilities Defined * Techniques for Analyzing the Current State * Define the Future State * Techniques for Defining the Future State * Assess Capability Gaps * Stakeholders Involved when Reviewing Capability Gaps * Discussion: Assessing New Capabilities * Defining Solution Scope * Determining Scope Boundary * How to Define Solution Scope * Defining Solution Scope * Project Scope and Product Scope * Scope Modeling * Techniques Used to Define Scope * Define Scope Boundaries * Modeling Scope: Context Diagram * Exercise 4a: Create a Context Diagram from the Case Study * Communicating Solution Scope to Stakeholders * Stakeholders Participating in Scope Activities * Exercise 4b: Discuss Managing Expectations * Module Summary ASSESSING FEASIBILITY & PROPOSING SOLUTION OPTIONS * Module Learning Objectives * Financial Analysis * Purpose of Financial Analysis * Costs versus Benefits * Financial Models * Timing for Assessing Financial Benefits * Risk * Assessing Risks * Risk Process * Exercise 5a: Identifying Risks * Risk Analysis * Capturing and Categorizing Risks * Risk Strategies * Tolerance for Risk * Determining Solution Options * Solution Option Process * Determining and Analyzing Solution Options * Brainstorming * Conducting an Outcomes Focused Brainstorming Session * Stakeholders Involved in Determining Solution Options * Exercise 5b: Determining Solution Options * Feasibility Analysis * Discussion: Ranking Solution Options * Discussion: Recommending the Most Viable Option * Exercise 5c: Assess the Most Viable Options * Solution Approach Definition * Exercise 5d: Review the Business Case Templates * Module Summary PACKAGING & PRESENTING THE BUSINESS CASE * Module Learning Objectives * Circumventing a Business Case * Documenting the Business Case * Value of the Business Case Process * Business Case Components * Business Case Techniques * Build a Convincing Business Case * Discussion: Identifying Decision Criteria * Exercise 6a: Supporting a Go/No Go Decision * Packaging the Business Case * Planning Business Case Delivery * Discussion: Planning Stakeholder Buy-in * Information and Communication Needs in the Business Case Process * Presenting your Business Case * Exercise 6b: Anticipating and Responding to Challenges * Module Summary COURSE WRAP UP * Course Summary * Questions * Additional Resources * Thank You * ADDITIONAL COURSE DETAILS: Nexus Humans BA03 - Writing Effective Business Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA03 - Writing Effective Business Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA03 - Writing Effective Business Cases
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. DESCRIBING INFORMATION SECURITY CONCEPTS* * Information Security Overview * Assets, Vulnerabilities, and Countermeasures * Managing Risk * Vulnerability Assessment * Understanding Common Vulnerability Scoring System (CVSS) DESCRIBING COMMON TCP/IP ATTACKS* * Legacy TCP/IP Vulnerabilities * IP Vulnerabilities * Internet Control Message Protocol (ICMP) Vulnerabilities * TCP Vulnerabilities * User Datagram Protocol (UDP) Vulnerabilities * Attack Surface and Attack Vectors * Reconnaissance Attacks * Access Attacks * Man-in-the-Middle Attacks * Denial of Service and Distributed Denial of Service Attacks * Reflection and Amplification Attacks * Spoofing Attacks * Dynamic Host Configuration Protocol (DHCP) Attacks DESCRIBING COMMON NETWORK APPLICATION ATTACKS* * Password Attacks * Domain Name System (DNS)-Based Attacks * DNS Tunneling * Web-Based Attacks * HTTP 302 Cushioning * Command Injections * SQL Injections * Cross-Site Scripting and Request Forgery * Email-Based Attacks DESCRIBING COMMON ENDPOINT ATTACKS* * Buffer Overflow * Malware * Reconnaissance Attack * Gaining Access and Control * Gaining Access via Social Engineering * Gaining Access via Web-Based Attacks * Exploit Kits and Rootkits * Privilege Escalation * Post-Exploitation Phase * Angler Exploit Kit DESCRIBING NETWORK SECURITY TECHNOLOGIES * Defense-in-Depth Strategy * Defending Across the Attack Continuum * Network Segmentation and Virtualization Overview * Stateful Firewall Overview * Security Intelligence Overview * Threat Information Standardization * Network-Based Malware Protection Overview * Intrusion Prevention System (IPS) Overview * Next Generation Firewall Overview * Email Content Security Overview * Web Content Security Overview * Threat Analytic Systems Overview * DNS Security Overview * Authentication, Authorization, and Accounting Overview * Identity and Access Management Overview * Virtual Private Network Technology Overview * Network Security Device Form Factors Overview DEPLOYING CISCO ASA FIREWALL * Cisco ASA Deployment Types * Cisco ASA Interface Security Levels * Cisco ASA Objects and Object Groups * Network Address Translation * Cisco ASA Interface Access Control Lists (ACLs) * Cisco ASA Global ACLs * Cisco ASA Advanced Access Policies * Cisco ASA High Availability Overview DEPLOYING CISCO FIREPOWER NEXT-GENERATION FIREWALL * Cisco Firepower NGFW Deployments * Cisco Firepower NGFW Packet Processing and Policies * Cisco Firepower NGFW Objects * Cisco Firepower NGFW Network Address Translation (NAT) * Cisco Firepower NGFW Prefilter Policies * Cisco Firepower NGFW Access Control Policies * Cisco Firepower NGFW Security Intelligence * Cisco Firepower NGFW Discovery Policies * Cisco Firepower NGFW IPS Policies * Cisco Firepower NGFW Malware and File Policies DEPLOYING EMAIL CONTENT SECURITY * Cisco Email Content Security Overview * Simple Mail Transfer Protocol (SMTP) Overview * Email Pipeline Overview * Public and Private Listeners * Host Access Table Overview * Recipient Access Table Overview * Mail Policies Overview * Protection Against Spam and Graymail * Anti-virus and Anti-malware Protection * Outbreak Filters * Content Filters * Data Loss Prevention * Email Encryption DEPLOYING WEB CONTENT SECURITY * Cisco Web Security Appliance (WSA) Overview * Deployment Options * Network Users Authentication * Secure HTTP (HTTPS) Traffic Decryption * Access Policies and Identification Profiles * Acceptable Use Controls Settings * Anti-Malware Protection DEPLOYING CISCO UMBRELLA* * Cisco Umbrella Architecture * Deploying Cisco Umbrella * Cisco Umbrella Roaming Client * Managing Cisco Umbrella * Cisco Umbrella Investigate Overview and Concepts EXPLAINING VPN TECHNOLOGIES AND CRYPTOGRAPHY * VPN Definition * VPN Types * Secure Communication and Cryptographic Services * Keys in Cryptography * Public Key Infrastructure INTRODUCING CISCO SECURE SITE-TO-SITE VPN SOLUTIONS * Site-to-Site VPN Topologies * IPsec VPN Overview * IPsec Static Crypto Maps * IPsec Static Virtual Tunnel Interface * Dynamic Multipoint VPN * Cisco IOS FlexVPN DEPLOYING CISCO IOS VTI-BASED POINT-TO-POINT IPSEC VPNS * Cisco IOS VTIs * Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration DEPLOYING POINT-TO-POINT IPSEC VPNS ON THE CISCO ASA AND CISCO FIREPOWER NGFW * Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW * Cisco ASA Point-to-Point VPN Configuration * Cisco Firepower NGFW Point-to-Point VPN Configuration INTRODUCING CISCO SECURE REMOTE ACCESS VPN SOLUTIONS * Remote Access VPN Components * Remote Access VPN Technologies * Secure Sockets Layer (SSL) Overview DEPLOYING REMOTE ACCESS SSL VPNS ON THE CISCO ASA AND CISCO FIREPOWER NGFW * Remote Access Configuration Concepts * Connection Profiles * Group Policies * Cisco ASA Remote Access VPN Configuration * Cisco Firepower NGFW Remote Access VPN Configuration EXPLAINING CISCO SECURE NETWORK ACCESS SOLUTIONS * Cisco Secure Network Access * Cisco Secure Network Access Components * AAA Role in Cisco Secure Network Access Solution * Cisco Identity Services Engine * Cisco TrustSec DESCRIBING 802.1X AUTHENTICATION * 802.1X and Extensible Authentication Protocol (EAP) * EAP Methods * Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications * RADIUS Change of Authorization CONFIGURING 802.1X AUTHENTICATION * Cisco Catalyst© Switch 802.1X Configuration * Cisco Wireless LAN Controller (WLC) 802.1X Configuration * Cisco Identity Services Engine (ISE) 802.1X Configuration * Supplicant 802.1x Configuration * Cisco Central Web Authentication DESCRIBING ENDPOINT SECURITY TECHNOLOGIES* * Host-Based Personal Firewall * Host-Based Anti-Virus * Host-Based Intrusion Prevention System * Application Whitelists and Blacklists * Host-Based Malware Protection * Sandboxing Overview * File Integrity Checking DEPLOYING CISCO ADVANCED MALWARE PROTECTION (AMP) FOR ENDPOINTS* * Cisco AMP for Endpoints Architecture * Cisco AMP for Endpoints Engines * Retrospective Security with Cisco AMP * Cisco AMP Device and File Trajectory * Managing Cisco AMP for Endpoints INTRODUCING NETWORK INFRASTRUCTURE PROTECTION* * Identifying Network Device Planes * Control Plane Security Controls * Management Plane Security Controls * Network Telemetry * Layer 2 Data Plane Security Controls * Layer 3 Data Plane Security Controls DEPLOYING CONTROL PLANE SECURITY CONTROLS* * Infrastructure ACLs * Control Plane Policing * Control Plane Protection * Routing Protocol Security DEPLOYING LAYER 2 DATA PLANE SECURITY CONTROLS* * Overview of Layer 2 Data Plane Security Controls * Virtual LAN (VLAN)-Based Attacks Mitigation * Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Junior Cricket Coaching

4.4(116)

By Hem Heath Cricket Club

Our cricket club holds junior training sessions for all age groups from 6yrs to 16years. All our our coaching staff are ECB qualified to level 2 and 3. We also have teams playing in all age categories, under 8, 10, 12, 13, 14 and 16. For those progressing beyond 16, we also have an under 19s team and a senior development team   Come and try one of our sessions for free on your first week. 

Junior Cricket Coaching
Delivered In-Person
Dates arranged on request
FREE

Outlook - advanced (In-House)

By The In House Training Company

This one-day workshop is intended for participants who have a basic understanding of Outlook but who want to know how to use its advanced features to manage their email communications, calendar events, contact information and other communication tasks. This course will help participants: * Gain confidence using Outlook and its advanced features * Organise and prioritise email messages * Archive messages for safe-keeping * Use rules to process received or sent messages automatically * Manage scheduled meetings with others * Give others permission to view and manage their folders and items * Use contacts and commands to find out more about a person or company * Prioritise work-flow using tasks and assigning tasks to others 1 EMAIL MESSAGES * Combining multiple clicks with quick steps * Following up flag options * Saving multiple attachments * Attaching a folder of files * Recalling and replacing a message * Categorising messages with conditional formatting 2 MESSAGE OPTIONS * Adding options to messages * Marking a message as private * Receiving quick responses with voting buttons * Directing replies to specific users * Delaying sent messages * Inserting links in messages 3 STAY ORGANISED WITH RULES * Using rules to automate message flow * Moving messages with rules * Using the rules wizard * Setting up rules with conditions * Using rules that work whilst you are away 4 MESSAGE CLEAN-UP * Using conversation clean-up * Using mailbox clean-up * Moving messages to the archive folder * Archiving folder properties * Auto-archiving properties 5 MANAGING CALENDARS * Creating calendar groups * Sharing calendars with permissions * Setting up working days and times * Managing time zones * Categorise appointments with conditional formatting * Publishing a calendar 6 SCHEDULE MEETINGS * Scheduling a meeting * Managing meeting responses * Proposing new meeting times * Adding attendees to a meeting * Viewing multiple appointments 7 USING CONTACTS * Merging contacts to letters * Merging contacts to labels * Mail merging contacts in Word * Exporting contacts to Excel 8 MANAGING TASKS * Organising your workload with tasks * Categorising tasks * Assigning tasks to others * Sending a task status report * Allocating time for tasks * Regenerating a new task * Viewing your tasks in the calendar 9 ADDING MESSAGE ITEMS * Adding calendars to messages * Adding business cards to messages 10 EMAIL ACCOUNTS * Adding multiple user accounts * Adding account permissions

Outlook - advanced (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Effective technical writing (In-House)

By The In House Training Company

The aim of this programme is to help attendees create better quality technical documents in an organised and efficient manner. It will give those new to the topic an appreciation of how to approach the task professionally whilst those with more experience will be able to refresh and refine their skills. The programme comprises three complementary one-day modules: The programme presents a structured methodology for creating technical documents and provides a range of practical techniques that help delegates put principles into practice. Although not essential, it is strongly advised that delegates for modules 2 and 3 have already attended module 1, or another equivalent course. Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. This course will: * Explain the qualities and benefits of well written technical documents * Present a structured approach for producing technical documents * Review the essential skills of effective technical writing * Demonstrate practical methods to help create better documents * Provide tools and techniques for specification and report writing * Review how technical documents should be issued and controlled Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. Module 1: Essential skills for technical writers 1 INTRODUCTION TO THE PROGRAMME * Aims and objectives of the module * Introductions and interests of participants 2 CREATING EFFECTIVE TECHNICAL DOCUMENTS * What is technical writing? how does it differ from other writing? * Key qualities of an effective technical document * Communication essentials and the challenges faced by technical writers * The lessons of experience: how the best writers write * The five key steps : prepare - organise - write - edit - release (POWER) 3 PREPARING TO WRITE * Defining the document aims and objectives; choosing the title * Understanding technical readers and their needs * Getting organised; planning and managing the process * Integrating technical and commercial elements * The role of intellectual property rights (IPR), eg, copyright 4 ORGANISING THE CONTENT * The vital role of structure in technical documents * Deciding what to include and how to organise the information * Categorising information: introductory, key and supporting * Tools and techniques for scoping and structuring the document * Creating and using document templates - pro's and con's 5 WRITING THE DOCUMENT * Avoiding 'blinding them with science': the qualities of clear writing * Problem words and words that confuse; building and using a glossary * Using sentence structure and punctuation to best effect * Understanding the impact of style, format and appearance * Avoiding common causes of ambiguity; being concise and ensuring clarity * Using diagrams and other graphics; avoiding potential pitfalls 6 EDITING AND RELEASING THE DOCUMENT * Why editing is difficult; developing a personal editing strategy * Some useful editing tools and techniques * Key requirements for document issue and control Module 2: Creating better specifications 1 INTRODUCTION * Aims and objectives of the day * Introductions and interests of participants * The 'POWER' writing process for specifications 2 CREATING BETTER SPECIFICATIONS * The role and characteristics of an effective specification * Specifications and contracts; the legal role of specifications * Deciding how to specify; understanding functional and design requirements * Developing the specification design; applying the principles of BS 7373 * Getting organised: the key stages in compiling an effective specification 3 PREPARING TO WRITE A SPECIFICATION * Defining the scope of the specification; deciding what to include and what not * Scoping techniques: scope maps, check lists, structured brainstorming * The why/what/how pyramid; establishing and understanding requirements * Clarifying priorities; separating needs and desires: the MoSCoW method * Useful quantitative techniques: cost benefit analysis, QFD, Pareto analysis * Dealing with requirements that are difficult to quantify 4 ORGANISING THE CONTENT * The role of structure in specifications * Typical contents and layout for a specification * What goes where: introductory, key and supporting sections * Creating and using model forms: the sections and sub sections * Detailed contents of each sub-section * Exercise: applying the tools and techniques 5 WRITING THE SPECIFICATION * Identifying and understanding the specification reader * Key words: will, shall, must; building and using a glossary * Writing performance targets that are clear and unambiguous * Choosing and using graphics * Exercise: writing a specification 6 EDITING AND RELEASING THE DOCUMENT * Key editing issues for specifications * Issue and control of specifications Module 3: Writing better reports 1 INTRODUCTION * Aims and objectives of the day * Introductions and interests of participants * The 'POWER' technical writing process for technical reports 2 CREATING BETTER REPORTS * What is a technical report? types and formats of report * The role and characteristics of an effective technical report * Understanding technical report readers and their needs * The commercial role and impact of technical reports * Getting organised: the key stages in compiling a technical report 3 PREPARING TO WRITE REPORTS * Agreeing the terms of reference; defining aims and objectives * Being clear about constraints; defining what is not to be included * Legal aspects and intellectual property rights (IPR) for reports * Preparing the ground; gathering information and reference documents * Keeping track of information: note making, cataloguing and cross referencing * Tools and techniques for developing a valid and convincing argument 4 ORGANISING THE CONTENT * The role of structure reviewed; some typical report structures * Who needs what: identifying the varied needs of the readership * What goes where: introductory, key and supporting sections * Creating and using model forms: the sections and sub sections * Detailed contents of each sub-section * Exercise: applying the tools and techniques 5 WRITING THE REPORT * Planning the storyline: the report as a journey in understanding * Recognising assumptions about the reader; what they do and don't know * Converting complex concepts into understandable statements * Presenting technical data and its analysis; the role of graphics * Presenting the case simply whilst maintaining technical integrity * Exercise: writing a technical report 6 EDITING AND RELEASING THE REPORT * Key editing issues for technical reports * Issue and control of technical reports

Effective technical writing (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Project management 'masterclasses' (In-House)

By The In House Training Company

Masterclasses? Refreshers? Introductions? It depends what you're looking for and where you want to pitch them, but here are six tried-and-tested highly focused sessions that organisations can take individually or as a series, to help develop their teams' project management capabilities one topic at a time. Objectives for each individual session are set out below, as part of the session outlines. Taken together, as a series, however, these modules are an ideal opportunity to develop your team's levels of project management capability maturity, whether that's by introducing them to the basic principles, refreshing them on best practice, or giving them the opportunity to really drill down into a specific area of challenge in your particular operating environment. SESSION OUTLINES 1 Stakeholder management SESSION OBJECTIVES This session will help participants: * Understand why stakeholders matter to projects * Be able to identify and engage stakeholders * Be able to categorise stakeholders by their significance 1 KEY PRINCIPLES * What does 'stakeholder' mean - in theory? * What does this mean in practice? * Why stakeholders matter * Consequences of missing stakeholders * The stakeholder management process: * Identify * Assess * Plan * Engage 2 IDENTIFYING STAKEHOLDERS * Rapid listing * CPIG analysis * PESTLE analysis * Drawing on the knowledge and experience of others * Other ways to identify stakeholders 3 ASSESSING STAKEHOLDERS * Which stakeholders are significant? * Stakeholder radar * Power-interest maps * Power-attitude maps 4 PLANNING * The adoption curve * Dealing with obstacles * Who should engage which stakeholder? * How should the project's organisation be structured? * How will communication happen? 5 ENGAGING * Seven principles of stakeholder engagement 2 Requirements and prioritisation SESSION OBJECTIVES This session will help participants: * Understand how clarity of requirements contributes to project success * Use different techniques for prioritising requirements * Agree requirements with stakeholders * Manage changes to requirements 1 UNDERSTANDING AND MANAGING STAKEHOLDER NEEDS AND EXPECTATIONS * What are 'requirements'? * What is 'requirements management'? * Sources of requirements - and the role of stakeholders * Are stakeholders sufficiently expert to specify their needs? * Do they understand the detail of what they want, or do they need help to tease that out? * What do stakeholders want to achieve? * Working within constraints * Prioritising requirements - three techniques 2 MOSCOW PRIORITISATION * 'Must have', should have', 'could have, 'won't have this time' * When to use MoSCoW 3 THE KANO MODEL * Customer satisfaction - 'attractive' and 'must-be' qualities * When to use Kano 4 VALUE-BASED PRIORITISATION * Understanding risk v value * Using risk v value to prioritise features and schedules 5 AGREEING REQUIREMENTS * Perfect v 'good enough' * Establishing acceptance criteria * Requirements traceability * Agreeing project scope 6 CHANGING REQUIREMENTS * Why requirements change * Why change control matters * Impact on projects * A formal change control process * Paying for change - managing change for different types of project 3 Estimating SESSION OBJECTIVES This session will help participants: * Understand the different purposes estimates satisfy * Be able to use different estimating techniques * Understand how to achieve different levels of accuracy 1 KEY PRINCIPLES * What's an estimate? Informed guesswork * What needs to be estimated? Costs, resources, effort, duration * Tolerances * Precision v accuracy 2 ESTIMATING THROUGH THE LIFECYCLE * Start * Plan * Do 3 EARLY ESTIMATES * Comparative ('analogous') estimating * Parametric estimating * Using multiple estimating techniques 4 BOTTOM-UP ESTIMATING * Bottom-up ('analytical') estimating * Pros * Cons 5 THREE-POINT ESTIMATING * Three-point ('PERT': Programme Evaluation and Review Technique) estimating * Uncertainty and the range of estimates * Calculating a weighted average * Three-point with bottom-up 4 Scheduling SESSION OBJECTIVES This session will help participants: * Understand how to create a viable schedule * Be able to use different forms of schedule * Understand the concept of the critical path 1 KEY PRINCIPLES * The planning horizon * Rolling wave planning * Release planning 2 VIABLE SCHEDULING * Creating a viable schedule * Define the scope * Sequence the work * Identify the risks and build in mitigations * Identify the resources * Estimate the effort and durations * Check resource availability * Refine until a workable schedule is produced 3 CRITICAL PATH ANALYSIS * The critical path * Network diagrams * Sequence logic * Practical application: * Network diagram with estimated durations * The 'forward pass' * The 'backward pass' * Calculating total float * Identifying the critical path * Calculating free float * Gantt charts 5 Risk and issue management SESSION OBJECTIVES This session will help participants: * Understand the difference between risks and issues * Be able to identify and assess risks * Understand ways of mitigating risks * Manage issues 1 KEY PRINCIPLES * Understanding risk * Threats and opportunities * The risk management process * Preparation - proactive risk management * The process - identify, assess, plan, implement * Stakeholder communication * Roles and responsibilities * Risk management strategy * The risk register * Risk appetite 2 RISK IDENTIFICATION * Brainstorming * Interviews * Assumption analysis * Checklists 3 RISK ASSESSMENT AND PRIORITISATION * Probability, impact and proximity * Triggers * Qualitative risk assessment * Qualitative impact assessment * Qualitative probability assessment * Probability / impact grid * Bubble charts * Risk tolerance 4 PLANNING COUNTERMEASURES * To mitigate or not to mitigate? * Categories of risk response * Avoid and exploit * Reduce and enhance * Transfer * Share * Accept * Contingency * Secondary risks 5 ISSUE MANAGEMENT * What is an issue? * Tolerances * Issues and tolerances * The PRINCE2 view of issues * Ownership of issues * An issue management process * Issue register 6 Budgeting and cost control SESSION OBJECTIVES This session will help participants: * Understand what to include in a budget - and why * Choose - and use - the appropriate estimating technique * Align the budget with the schedule * Understand how to monitor spend and control costs * Trouble-shoot effectively to get projects back within budget SESSION FORMAT Flexible. The session can be tailored to the participants' average level of project management maturity - a 60-minute session (delivered virtually) is an effective introduction. A 90-minute session allows for more in-depth treatment. A half-day session (face-to-face or virtual) gives time for a more challenging workshop, particularly to discuss specific cost control issues with any of the participants' current projects. 1 WHERE IS THE MONEY COMING FROM? * Can we pay from revenue? Do we need to borrow? How long will the project take to pay back? * The lifecycle of the budget * Through-life costs * Stakeholder involvement 2 ESTIMATING COSTS * Reminder: the relationship between estimates * Reminder: possible estimating techniques * What do we need to estimate? * People * Equipment * Materials * Facilities and operating costs * Work package estimate * Estimated project costs * Estimating agile projects 3 ALIGNING BUDGET AND SCHEDULE * Scheduling and financial periods * Spreading the budget 4 RESERVES AND AGREEING THE BUDGET * Contingency reserve * Management reserve * Agreeing the budget 5 COST CONTROL * Planned spend over time * Actual spend over time * Work completed over time * Evaluating different scenarios: delivery v spend 6 TROUBLE-SHOOTING * Why are we where we are? * What has caused the project to spend at the rate it is? * Why is it delivering at the rate it is? * What are the root causes? * What can we do about it?

Project management 'masterclasses' (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Visual Analytics Best Practice

By Tableau Training Uk

This course is very much a discussion, so be prepared to present and critically analyse your own and class mates work. You will also need to bring a few examples of work you have done in the past. Learning and applying best practice visualisation principles will improve effective discussions amongst decision makers throughout your organisation. As a result more end-users of your dashboards will be able to make better decisions, more quickly. This 2 Day training course is aimed at analysts with good working knowledge of BI tools (we use Tableau to present, but attendees can use their own software such as Power BI or Qlik Sense). It is a great preparation for taking advanced certifications, such as Tableau Certified Professional. -------------------------------------------------------------------------------- Contact us to discuss the Visual Analytics Best Practice course Email us if you are interested in an on-site course, or would be interested in different dates and locations -------------------------------------------------------------------------------- This Tableau Desktop training intermediate course is designed for the professional who has a solid foundation with Tableau and is looking to take it to the next level. Attendees should have a good understanding of the fundamental concepts of building Tableau worksheets and dashboards typically achieved from having attended our Tableau Desktop Foundation Course. At the end of this course you will be able to communicate insights more effectively, enabling your organisation to make better decisions, quickly. The Tableau Desktop Analyst training course is aimed at people who are used to working with MS Excel or other Business Intelligence tools and who have preferably been using Tableau already for basic reporting. -------------------------------------------------------------------------------- THE COURSE INCLUDES THE FOLLOWING TOPICS: WHAT IS VISUAL ANALYSIS? * Visual Analytics * Visual Analytics Process * Advantages of Visual Analysis * Exercise: Interpreting Visualisations HOW DO WE PROCESS VISUAL INFORMATION? * Memory and Processing Types * Exercise: Identifying Types of Processing * Cognitive Load * Exercise: Analysing Cognitive Load * Focus and Guide the Viewer * Remove Visual Distractions * Organise Information into Chunks * Design for Proximity * Exercise: Reducing Cognitive Load SENSORY MEMORY * Pre-attentive Attributes * Quantitatively-Perceived Attributes * Categorically-Perceived Attributes * Exercise: Analysing Pre-attentive Attributes * Form & Attributes * Exercise: Using Form Effectively * Colour & Attributes * Exercise: Using Colour Effectively * Position & Attributes * Exercise: Using Position Effectively ENSURING VISUAL INTEGRITY * Informing without Misleading * Gestalt Principles * Visual Area * Axis & Scale * Colour * Detail * Exercise: Informing without Misleading CHOOSING THE RIGHT VISUALISATION * Comparing and Ranking Categories * Comparing Measures * Comparing Parts to Whole * Viewing Data Over Time * Charts Types for Mapping * Viewing Correlation * Viewing Distributions * Viewing Specific Values DASHBOARDS AND STORIES * Exercise: Picking the Chart Type * Exercise: Brainstorming Visual Best Practice * Development Process for Dashboards and Stories * Plan the Visualisation * Create the Visualisation * Test the Visualisation * Exercise: Designing Dashboards and Stories -------------------------------------------------------------------------------- This training course includes over 20 hands-on exercises to help participants “learn by doing” and to assist group discussions around real-life use cases. Each attendee receives an extensive training manual which covers the theory, practical applications and use cases, exercises and solutions together with a USB with all the materials required for the training. The course starts at 09:30 on the first day and ends at 17:00. On the second day the course starts at 09:00 and ends at 17:00. Students must bring their own laptop with an active version of Tableau Desktop 10.5 (or later) pre-installed. -------------------------------------------------------------------------------- WHAT PEOPLE ARE SAYING ABOUT THIS COURSE "Steve was willing to address questions arising from his content in a full and understandable way" Lisa L. "Really enjoyed the course and feel the subject and the way it was taught was very close to my needs" James G. "The course tutor Steve was incredibly helpful and taught the information very well while making the two days very enjoyable." Bradd P. "The host and his courses will give you the tools and confidence that you need to be comfortable with Tableau." Jack S. "Steve was fantastic with his knowledge and knowhow about the product. Where possible he made sure you could put demonstrations in to working practice, to give the audience a clear understanding." Tim H. "This was a very interesting and helpful course, which will definitely help me produce smarter, cleaner visualisations that will deliver more data-driven insights within our business." Richard A. "Steve is very open to questions and will go out of his way to answer any query. Thank you" Wasif N. "Steve was willing to address questions arising from his content in a full and understandable way" Lisa L. "Really enjoyed the course and feel the subject and the way it was taught was very close to my needs" James G.

Visual Analytics Best Practice
Delivered in-person, on-request, onlineDelivered Online & In-Person in Birmingham & 2 more
Price on Enquiry

Power BI - dashboards (1 day) (In-House)

By The In House Training Company

Power BI is a powerful data visualisation program that allows businesses to monitor data, analyse trends, and make decisions. This course is designed to provide a solid understanding of the reporting side of Power BI, the dashboards, where administrators, and end users can interact with dynamic visuals that communicates information. This course focuses entirely on the creation and design of visualisations in dashboards, including a range of chart types, engaging maps, and different types of tables. Designing dashboards with KPI's (key performance indicators), heatmaps, flowcharts, sparklines, and compare multiple variables with trendlines. This one-day programme focuses entirely on creating dashboards, by using the many visualisation tools available in Power BI. You will learn to build dynamic, user-friendly interfaces in both Power BI Desktop and Power BI Service. 1 INTRODUCTION * Power BI ecosystem * Things to keep in mind * Selecting dashboard colours * Importing visuals into Power BI * Data sources for your analysis * Joining tables in Power BI 2 WORKING WITH DATA * Utilising a report theme * Table visuals * Matrix visuals * Drilling into hierarchies * Applying static filters * Group numbers with lists * Group numbers with bins 3 CREATING VISUALS * Heatmaps in Power BI * Visualising time-intelligence trends * Ranking categorical totals * Comparing proportions * View trends with sparklines 4 COMPARING VARIABLES * Insert key performance indicators (KPI) * Visualising trendlines as KPI * Forecasting with trendlines * Visualising flows with Sankey diagrams * Creating a scatter plot 5 MAPPING OPTIONS * Map visuals * Using a filled map * Mapping with latitude and longitude * Mapping with ArcGIS or ESRI 6 CREATING DASHBOARDS * High-level dashboard * Migration analysis dashboard * Adding slicers for filtering * Promote interaction with nudge prompts * Searching the dashboard with a slicer * Creating dynamic labels * Highlighting key points on the dashboard * Customised visualisation tooltips * Syncing slicers across pages 7 SHARING DASHBOARDS * Setting up and formatting phone views * Exporting data * Creating PDF files * Uploading to the cloud * Share dashboards in SharePoint online

Power BI - dashboards (1 day) (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Commercial awareness for technical people (In-House)

By The In House Training Company

The aim of this course is to expose the commercial context within which technical work is carried out. It is to allow technical staff to understand how they fit into a larger picture, why they may be asked to undertake tasks that may not appear to be technical and the impact their interactions have within the commercial context. The scope of the programme includes: The course emphasises the collaborative nature of delivery and the need to offer value to customers. The principal training objectives for this programme are to help participants: * Understand why technical roles are broader than we might assume * Appreciate the importance of, and the need to support, sales * Value the idea of 'Good Enough' * Recognise what can affect profitability * Realise the future needs protecting 1 INTRODUCTION * (Course sponsor) * Why this programme has been developed * Review of participants' needs and objectives 2 THAT'S NOT MY JOB! * How we see our own role in work * How other people see our role * Stakeholders: who are they and why do they matter? * The organisational backdrop * What is my role really? 3 SALES AND MARKETING * Where does the money come from? * Where do we find customers? * The sales process * One-off sales versus repeat business * Customer/supplier relationships * What something costs versus what the customer will pay * The value chain 4 ESTIMATING * Purpose of estimates * The problem with precision * Five estimating techniques 5 CHANGE CONTROL * Can you just do this for me? * When being helpful leads to bankruptcy * How to deal with change requests 6 RISK MANAGEMENT * Risk in projects * Risk in operations * Categories of risk 7 THE VALUE OF INTELLECTUAL PROPERTY * Issues with sharing information * Commercial in confidence * Non-disclosure agreements 8 COURSE REVIEW AND ACTION PLANNING * (Course sponsor present) * Identify actions to be implemented individually * What actions should be implemented to improve working with non-technical people? * Conclusion

Commercial awareness for technical people (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry